<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tls-super-jumbo-record-limit-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="Large Record Sizes for TLS">Large Record Sizes for TLS and DTLS with Reduced Overhead</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tls-super-jumbo-record-limit-01"/>
    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization>Ericsson</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
      <organization abbrev="H-BRS">University of Applied Sciences Bonn-Rhein-Sieg</organization>
      <address>
        <email>Hannes.Tschofenig@gmx.net</email>
      </address>
    </author>
    <author initials="M." surname="Tüxen" fullname="Michael Tüxen">
      <organization>Münster Univ. of Applied Sciences</organization>
      <address>
        <email>tuexen@fh-muenster.de</email>
      </address>
    </author>
    <date year="2025" month="May" day="28"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>next generation</keyword>
    <keyword>unicorn</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 57?>

<t>TLS 1.3 records limit the inner plaintext (TLSInnerPlaintext) size to 2<sup>14</sup> + 1 bytes, which includes one byte for the content type. Records also have a 3-byte overhead due to the fixed opaque_type and legacy_record_version fields. This document defines a TLS extension that allows endpoints to negotiate a larger maximum inner plaintext size, up to 2<sup>32</sup> - 256 bytes, while reducing overhead.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://tlswg.github.io/super-jumbo-record-limit/draft-ietf-tls-super-jumbo-record-limit.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-tls-super-jumbo-record-limit/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/tlswg/super-jumbo-record-limit"/>.</t>
    </note>
  </front>
  <middle>
    <?line 61?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>TLS 1.3 records limit the inner plaintext (TLSInnerPlaintext) size to 2<sup>14</sup> + 1 bytes, which includes one byte for the content type. Records also have a 3-byte overhead due to the fixed opaque_type and legacy_record_version fields. TLS-based protocols are increasingly used to secure long-lived interfaces in critical infrastructure, such as telecommunication networks. In some infrastructure use cases, the upper layer of DTLS expects a message oriented service and uses message sizes much larger than 2<sup>14</sup>-bytes. In these cases, the 2<sup>14</sup>-byte limit in TLS necessitates an additional protocol layer for fragmentation, resulting in increased CPU and memory consumption and additional complexity. Allowing 2<sup>32</sup>-byte records would eliminate additional fragmentation in almost all use cases. In <xref target="RFC6083"/> (DTLS over SCTP), the 2<sup>14</sup>-byte limit is a severe restriction.</t>
      <t>This document defines a "large_record_size_limit" extension that allows endpoints to negotiate a larger maximum inner plaintext (TLSInnerPlaintext) size. This extension is valid in TLS 1.3 and DTLS 1.3. The extension works similarly to the "record_size_limit" extension defined in <xref target="RFC8449"/>. Additionally, this document defines new TLS 1.3 TLSLargeCiphertext and DTLS 1.3 unified_hdr structures to enable inner plaintexts up to 2<sup>32</sup> - 256 bytes with reduced overhead. For example, inner plaintexts up to 2<sup>16</sup> - 256 bytes can be supported with 3 bytes less overhead, which is useful in constrained IoT environments. The "large_record_size_limit" extension is incompatible with middleboxes expecting TLS 1.2 records.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="the-largerecordsizelimit-extension">
      <name>The "large_record_size_limit" Extension</name>
      <t>The ExtensionData of the "large_record_size_limit" extension is LargeRecordSizeLimit:</t>
      <artwork><![CDATA[
   uint32 LargeRecordSizeLimit;
]]></artwork>
      <t>LargeRecordSizeLimit denotes the maximum size, in bytes, of inner plaintexts that the endpoint is willing to receive. It includes the content type and padding (i.e., the complete length of TLSInnerPlaintext). AEAD expansion is not included.</t>
      <t>The large record size limit only applies to records sent toward the endpoint that advertises the limit. An endpoint can send records that are larger than the limit it advertises as its own limit. A TLS endpoint that receives a record larger than its advertised limit <bcp14>MUST</bcp14> generate a fatal "record_overflow" alert; a DTLS endpoint that receives a record larger than its advertised limit <bcp14>MAY</bcp14> either generate a fatal "record_overflow" alert or discard the record. An endpoint <bcp14>MUST NOT</bcp14> add padding to records that would cause the length of TLSInnerPlaintext to exceed the limit advertised by the other endpoint.</t>
      <t>Endpoints <bcp14>MUST NOT</bcp14> send a "large_record_size_limit" extension with a value smaller than 64 or larger than 2<sup>32</sup> - 256. An endpoint <bcp14>MUST</bcp14> treat receipt of a smaller or larger value as a fatal error and generate an "illegal_parameter" alert.</t>
      <t>The server sends the "large_record_size_limit" extension in the EncryptedExtensions message. During resumption, the limit is renegotiated. Records are subject to the limits that were set in the handshake that produces the keys that are used to protect those records. This admits the possibility that the extension might not be negotiated during resumption.</t>
      <t>Unprotected messages and records protected with early_traffic_secret or handshake_traffic_secret are not subject to the large record size limit.</t>
      <t>When the "large_record_size_limit" extension is negotiated:</t>
      <ul spacing="normal">
        <li>
          <t>All TLS 1.3 records protected with application_traffic_secret <bcp14>MUST</bcp14> use the TLSLargeCiphertext structure instead of the TLSCiphertext structure. The size of the length field depends on the limit advertised by the receiver. If the limit is less than 2<sup>16</sup> - 255 an uint16 is used, if the limit is larger than 2<sup>24</sup> - 256 an uint32 is used, and otherwise an uint24 is used. The length is fixed for the connection. Different lengths might be used in different directions.</t>
        </li>
      </ul>
      <artwork><![CDATA[
   enum { u16(0), u24(1), u32(2) } Length;
]]></artwork>
      <artwork><![CDATA[
   struct {
       select (Length.type) {
           case u16: uint16;
           case u24: uint24;
           case u32: uint32;
       };
    } VarLength;
]]></artwork>
      <artwork><![CDATA[
   struct {
       VarLength length;
       opaque encrypted_record[TLSLargeCiphertext.length];
   } TLSLargeCiphertext;
]]></artwork>
      <ul spacing="normal">
        <li>
          <t>All DTLS 1.3 records protected with application_traffic_secret and with length present <bcp14>MUST</bcp14> use a unified_hdr structure with a length equal to the TLS 1.3 length field defined above.</t>
        </li>
      </ul>
      <artwork><![CDATA[
    0 1 2 3 4 5 6 7
   +-+-+-+-+-+-+-+-+
   |0|0|1|C|S|L|E E|
   +-+-+-+-+-+-+-+-+
   | Connection ID |   Legend:
   | (if any,      |
   /  length as    /   C   - Connection ID (CID) present
   |  negotiated)  |   S   - Sequence number length
   +-+-+-+-+-+-+-+-+   L   - Length present
   |  8 or 16 bit  |   E   - Epoch
   |Sequence Number|
   +-+-+-+-+-+-+-+-+
   | 16, 24, or 32 |
   |  bit Length   |
   | (if present)  |
   +-+-+-+-+-+-+-+-+
]]></artwork>
      <ul spacing="normal">
        <li>
          <t>An endpoint <bcp14>MAY</bcp14> generate records protected with application_traffic_secret with inner plaintext that is equal to or smaller than the LargeRecordSizeLimit value it receives from its peer. An endpoint <bcp14>MUST NOT</bcp14> generate a protected record with inner plaintext that is larger than the LargeRecordSizeLimit value it receives from its peer.</t>
        </li>
      </ul>
      <t>The "large_record_size_limit" extension is not compatible with middleboxes expecting TLS 1.2 records and <bcp14>SHOULD NOT</bcp14> be negotiated where such middleboxes are expected. A server <bcp14>MUST NOT</bcp14> send extension responses to more than one of "large_record_size_limit", "record_size_limit", and "max_fragment_length". A client <bcp14>MUST</bcp14> treat receipt of more than one of "large_record_size_limit", "record_size_limit", and "max_fragment_length" as a fatal error, and it <bcp14>SHOULD</bcp14> generate an "illegal_parameter" alert.</t>
      <t>The Path Maximum Transmission Unit (PMTU) in DTLS also limits the size of records. The record size limit does not affect PMTU discovery and <bcp14>SHOULD</bcp14> be set independently. The record size limit is fixed during the handshake and so should be set based on constraints at the endpoint and not based on the current network environment. In comparison, the PMTU is determined by the network path and can change dynamically over time.</t>
    </section>
    <section anchor="limits-on-key-usage">
      <name>Limits on Key Usage</name>
      <t>The maximum record size limit is an input to the AEAD limits calculations in TLS 1.3 <xref target="RFC8446"/> and DTLS 1.3 <xref target="RFC9147"/>. Increasing the maximum record size to more than 2<sup>14</sup> + 256 bytes while keeping the same confidentiality and integrity advantage per write key therefore requires lower AEAD limits. When the "large_record_size" has been negotiated record size limit larger than 2<sup>14</sup> + 1 bytes, existing AEAD limits <bcp14>SHALL</bcp14> be decreased by a factor of (LargeRecordSizeLimit) / (2^14-256). For example, when AES-CGM is used in TLS 1.3 <xref target="RFC8446"/> with a 64 kB record limit, only arounf 2<sup>22.5</sup> records (about 6 million) may be encrypted on a given connection.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Large record sizes might require more memory allocation for senders and receivers. Additionally, larger record sizes also means that more processing is done before verification of non-authentic records fails.</t>
      <t>The use of larger record sizes can either simplify or complicate traffic analysis, depending on the application. The LargeRecordSizeLimit is just an upper limit and it is still the sender that decides the size of the inner plaintexts up to that limit.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to assign a new value in the TLS ExtensionType Values registry defined by <xref target="RFC8447"/>:</t>
      <ul spacing="normal">
        <li>
          <t>The Extension Name should be large_record_size_limit</t>
        </li>
        <li>
          <t>The TLS 1.3 value should be CH, EE</t>
        </li>
        <li>
          <t>The DTLS-Only value should be N</t>
        </li>
        <li>
          <t>The Recommended value should be Y</t>
        </li>
        <li>
          <t>The Reference should be this document</t>
        </li>
      </ul>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8447">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy. These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
              <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8447"/>
          <seriesInfo name="DOI" value="10.17487/RFC8447"/>
        </reference>
        <reference anchor="RFC8449">
          <front>
            <title>Record Size Limit Extension for TLS</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>An extension to Transport Layer Security (TLS) is defined that allows endpoints to negotiate the maximum size of protected records that each will send the other.</t>
              <t>This replaces the maximum fragment length extension defined in RFC 6066.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8449"/>
          <seriesInfo name="DOI" value="10.17487/RFC8449"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6083">
          <front>
            <title>Datagram Transport Layer Security (DTLS) for Stream Control Transmission Protocol (SCTP)</title>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen"/>
            <author fullname="R. Seggelmann" initials="R." surname="Seggelmann"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="January" year="2011"/>
            <abstract>
              <t>This document describes the usage of the Datagram Transport Layer Security (DTLS) protocol over the Stream Control Transmission Protocol (SCTP).</t>
              <t>DTLS over SCTP provides communications privacy for applications that use SCTP as their transport protocol and allows client/server applications to communicate in a way that is designed to prevent eavesdropping and detect tampering or message forgery.</t>
              <t>Applications using DTLS over SCTP can use almost all transport features provided by SCTP and its extensions. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6083"/>
          <seriesInfo name="DOI" value="10.17487/RFC6083"/>
        </reference>
      </references>
    </references>
    <?line 183?>

<section removeInRFC="true" numbered="false" anchor="change-log">
      <name>Change Log</name>
      <t>Changes from -04 to -05:</t>
      <ul spacing="normal">
        <li>
          <t>Grammar and comprehension tweaks.</t>
        </li>
        <li>
          <t>Added change log</t>
        </li>
      </ul>
      <t>Changes from -03 to -04:</t>
      <ul spacing="normal">
        <li>
          <t>Corrected uint24 to uint32.</t>
        </li>
      </ul>
      <t>Changes from -02 to -03:</t>
      <ul spacing="normal">
        <li>
          <t>Major rewrite based on discussions at IETF 119</t>
        </li>
        <li>
          <t>New independant extension instead of flag extension used together with record_size_limit</t>
        </li>
        <li>
          <t>New record format without opaque_type and legacy_record_version fields. This reduces overhead</t>
        </li>
        <li>
          <t>Support inner plaintext size up to 2^32 - 256 bytes</t>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank <contact fullname="Stephen Farrell"/>, <contact fullname="Benjamin Kaduk"/>, and <contact fullname="Martin Thomson"/> for their valuable comments and feedback. Some of the text were inspired by and borrowed from <xref target="RFC8449"/>.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
